Best Risk-Based Vulnerability Management Software for Datadog

Compare the Top Risk-Based Vulnerability Management Software that integrates with Datadog as of October 2025

This a list of Risk-Based Vulnerability Management software that integrates with Datadog. Use the filters on the left to add additional filters for products that have integrations with Datadog. View the products that work with Datadog in the table below.

What is Risk-Based Vulnerability Management Software for Datadog?

Risk-Based Vulnerability Management software is a software solution that helps organizations identify, assess and prioritize the security risks associated with their IT systems. This type of solution works to identify and measure any existing vulnerabilities within the organization's environment, allowing for better risk management decisions. It also includes tools used to monitor an organization's environment for potential new threats. Furthermore, it can provide guidance on how to remediate any existing vulnerabilities identified in the network. Finally, it enables organizations to track progress over time as they work to strengthen their cyber security posture. Compare and read user reviews of the best Risk-Based Vulnerability Management software for Datadog currently available using the table below. This list is updated regularly.

  • 1
    KernelCare Enterprise
    Global organizations trust TuxCare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the TuxCare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. TuxCare automates the patching process and eliminates the need to wait weeks or months for reboot cycles to apply patches. TuxCare currently protects over 1 million workloads worldwide. Tight integrations with popular patch management and vulnerability scanners, including Qualys, Crowdstrike, and Rapid7, enable TuxCare to fit seamlessly into existing infrastructure. The TuxCare secure patch server, ePortal, allows operations in gated and air-gapped environments. Reduce risk by significantly reducing the mean time to patch vulnerabilities
    Starting Price: $3.95 per month
  • 2
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 3
    Hadrian

    Hadrian

    Hadrian

    Hadrian reveals the hacker’s perspective so the risks that matter most can be remediated with less effort. - Hadrian scans the internet to identify new assets and configurations changes to existing assets in real time. Our Orchestrator AI gathers contextual insights to reveal unseen links between assets. - - Hadrian’s platform detects over 10,000 3rd party SaaS applications, 1,000s of different software packages and versions, plugins for common tools, and open source repositories. - Hadrian identifies vulnerabilities, misconfigurations and exposed sensitive files. Risks are validated by Orchestrator AI to ensure accuracy, and ranked based on exploitability and business impact. - Hadrian finds exploitable risks the moment they appear in your attack surface. The tests are triggered immediately by Hadrian’s event-based Orchestrator AI.
  • Previous
  • You're on page 1
  • Next